How to enable Ransomware Protection in Windows Defender and add custom folders to it – By Ashwinghacks.net
Windows Defender has been gaining a foothold steadily for the past few years. But there is one flaw in the antivirus that ships with Windows 10.
Everybody Should 2FA – By Authy youtube.com Video
Learn more about two-factor authentication and download the Authy app for IOS, Android and Chrome.
How to do two-factor authentication like a pro – By Sandra Gutierrez G
You can hold the key to your online security. Like, literally.
If your level of anxiety over online security and privacy is on the healthy side, you probably already have two-factor authentication (2FA) set up for your main accounts. If you don't, you should seriously consider activating it to protect yourself from phishing, hacks, and anybody who may want to steal your data.
What to Do Before (and After) Your Phone Is Stolen – By Andrew Heinzmanhowtogeek.com
Millions of phones are stolen every year, and there’s a chance yours could be one of them. But it doesn’t have to be—you can make your phone theftproof! We’ll show you how, and what you should do if your phone is stolen.
The era of the $200 security camera is over. This $20 alternative is impressive – By Megan Wollertoncnet.com
When I started writing about the smart home in 2013, influential startup Dropcam, purchased by Google's Nest in 2014, set the industry prices for DIY security cameras.
My Experience with a Charles Schwab Debit Card in Withdrawing Cash in Abroad — By Anya Kartashova10xtravel.com
International travel is often filled with the excitement of getting to know a new country, trying its food and learning about its traditions. However, it also comes with a plethora of headaches, such as how to communicate with locals without speaking their language, how to buy a SIM card to post all your Instagram photos and how to get cash without being ripped off.
Why You Need a Password Manager. Yes, You. – By thewirecutter.com
You probably know that it’s not a good idea to use “password” as a password, or your pet’s name, or your birthday. But the worst thing you can do with your passwords—and something that more than 50 percent of people are doing, according to a recent Virginia Tech study—is to reuse the same ones across multiple sites. If even one of those accounts is compromised in a data breach, it doesn’t matter how strong your password is—hackers can easily use it to get into your other accounts.
The Risk of Weak Online Banking Passwords – By krebsonsecurity.com
If you bank online and choose weak or re-used passwords, there’s a decent chance your account could be pilfered by cyberthieves — even if your bank offers multi-factor authentication as part of its login process. This story is about how crooks increasingly are abusing third-party financial aggregation services like Mint, Plaid, Yodlee, YNAB and others to surveil and drain consumer accounts online.
How to Protect Your Smarthome from Attack – By Josh Hendricksonhowtogeek.com
Every new device you introduce into your smarthome is another device that can be attacked. You can secure your smarthome with simple steps like locking down your router and taking proper care of the gadgets in your smarthome.
Why Are Companies Still Storing Passwords In Plain Text? – By Josh Hendricksonhowtogeek.com6 min
Several companies have recently admitted to storing passwords in plain-text format. That’s like storing a password in Notepad and saving it as a .txt file. Passwords should be salted and hashed for security, so why isn’t that happening in 2019?
ZenMate Review – By ZenMatethebestvpn.com8 min
The first visit to the ZenMate.com homepage shows off a professional, sleek, and minimalistic design.
According to their website, there are also over 41 million ZenMate users across the world who use the tool “to access the web securely, anonymously and without restriction.”
Best password managers: Reviews of the top products – By Michael Ansaldopcworld.com5 min
We are terrible at passwords. We suck at creating them (the top two most popular remain “123456” and “password”), we share them way too freely, and we forget them all the time. Indeed, the very thing that can ensure our online security has become our biggest obstacle to it. This is what makes a good password manager essential.
The 5 Best Authenticator Apps to Generate 2FA Codes on Mac – By Rob Nightingalemakeuseof.com5 min
Want to secure your online accounts with two-factor authentication (2FA)? Then you’ll need an authenticator app to scan the relevant QR codes during the setup process. Such an app can also generate the TOTPs (Time-Based One-Time Passwords) that you need, in addition to your login passwords, to unlock your 2FA-enabled accounts.
Online password overload making your head explode? A cyberfraud expert has the answer – By Rob Carricktheglobeandmail.com3 min
Technology’s most epic fail of the past two decades is arguably that passwords are still being used for internet security.
Passwords were manageable 20 years ago, when we frequented a small number of websites at most and few or none of them involved money. Today, many of us have half our lives online.
Instead of Changing Your Passwords, Upgrade Them – By David MurphyEmailTwitterPostslifehacker.com4 min
What makes for a great password? Something long, something randomized with all kinds of characters—numbers, symbols, and letters of all cases—and, ideally, something backed up by a secondary authentication method. In other words, the easier it is for you to remember your password, the easier it is for someone else to crack it (generally speaking).
7 Reasons You Should Be Using a Password Manager – By Dave Parrackmakeuseof.com5 min
You’ve heard about password managers like LastPass and Dashlane, but you’re not sure if you need one. Well, here’s the thing: you need one. If you have more than one account and are security-aware enough to maintain different passwords, you need a password manager.
How to Turn on Two-Factor Authentication For Your Amazon Account – By Rob Woodgatehowtogeek.com3 min
Two-Factor Authentication (2FA) is a great security tool, and we always recommend it. Most apps make it pretty easy to turn on 2FA, and Amazon is no exception. Here’s how to enable it and make yourself safer.
What is Gmail Confidential mode? – By Marc Lagaceandroidcentral.com2 min
Best answer: Confidential Mode is a feature built into the Gmail mobile app that gives you better control over emails containing sensitive or personal information. You're able to set emails to expire after a set amount of time, require SMS passcode verification to open the message, or you can go in and revoke someone's access to an email.
Why You Should Use a Password Manager, and How to Get Started – By Chris Hoffmanhowtogeek.com6 min
The majority of people use very weak passwords and reuse them on different websites. How are you supposed to use strong, unique passwords on all the websites you use? The solution is a password manager.
LastPass: Password security for your family in 2018 – By dottotech youtube.com VIDEO
Improve your online security and save time with LastPass, the password manager that remembers all your passwords so you don't have to.
How to Create a Strong Password (and Remember It) – By Chris Hoffmanhowtogeek.com6 min
“Be sure to use a strong password” is advice we all constantly see online. Here’s how to create a strong password—and, more importantly, how to actually remember it.
How to use Gmail Confidential mode – By Marc Lagaceandroidcentral.com2 min
Ever worry about what happens to your emails after they're sent? When your emails contain sensitive or confidential information, it's nice to know that these emails can't be archived, printed, forwarded, or simply left sitting in an inbox waiting to be skimmed by email hackers.
Google releases Suspicious Site Reporter extension for Chrome – By Martin Brinkmannghacks.net
Suspicious Site Reporter is a new browser extension by Google for the company's Chrome web browser that provides users with options to report sites to the company.
The extension has two main functions: to report sites to Google and to highlight if Google found anything suspicious about the site.
Got a Chromebook? Here’s how and why you need to protect your Google account – By Kevin C. Tofelaboutchromebooks.com4 min
With a simple Google account sign on, a Chromebook is quick to get you working, playing or whatever you want to do. But that Google account is the key to your Chromebook castle, and probably many other services as well, so you want to make sure it’s protected at all costs.
Use Token to protect yourself against credit card fraud – By Rick Broidacnet.com4 min
My son had his first debit card for all of three months before the number got stolen and used for unauthorized purchases — to the tune of about $1,600. It's happened to me at least three or four times. And based on a couple informal polls I ran, at least 75 percent of Cheapskate readers have experienced it at least once.
LastPass Password Manager Review— Worth Downloading? – By Gwynn Ballard securitybaron.com
We all heavily depend on password-protected sites and apps. Between social networking, work emails, personal emails, and online banking, using the same password for everything may seem convenient. But using one password across multiple accounts makes you much more vulnerable to hackers and security breaches. Luckily, there are password managers that allow you to store all of your unique passwords in one place.
The Five Best Password Managers – By Alan Henrylifehacker.com12 min
A while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or keep them local only, change web passwords with a click, log in to sites for you, and more.
Does Two-Factor Authentication Really Make You Safer? – By Max Eddy pcmag.com
This week, I'm digging back into my bottomless mailbag to tackle another question about two-factor authentication (2FA). It's a subject I've touched on before, but judging from the volume and specificity of the questions I've received about it, it's clearly an issue a lot of people are thinking about. Since I view 2FA as, perhaps, the single best thing regular people can do to stay safe online, I'm more than happy to talk endlessly about it.
How to Organize Your Password Manager in 7 Steps – By Dave Parrack, www.makeuseof.com
After using LastPass for over six years, I recently decided to move to 1Password. Once I’d moved my information over to the new service, I realized how much junk had built up in my password manager over the years.
Smart Lock is Android's best-kept secret – By Ara Wagoner, www.androidcentral.com
The original Moto X was a glorious phone for a lot of reasons, and I loved mine to (literal) death for its clean software, Moto Voice, and also for this awesome little feature called Trusted Bluetooth. Trusted Bluetooth kept your phone unlocked so long as it stayed in connected to a trusted device, and since my headphones lived around my neck, I hardly ever unlocked my phone.
What Is Gmail Confidential Mode? (And How to Use It) by Richard Priday tomsguide.com
Since 2018, the time of Gmail’s last redesign, personal account users have been able to activate ‘Confidential Mode’, a series of options intended to make your emails more secure.
Credit: ShutterstockAmong these options are making the email delete itself after a set period of time, limiting the recipient’s ability to copy, forward, print or download the contents, instantly revoking access or setting up an SMS verification lock, which sends the recipient a code they have to enter before reading what you’ve sent to them.
5 Simple Windows Security Tips You've Got No Excuse to Ignore – By David Nield, gizmodo.com
Computer security doesn’t really have to be hard. Some of the smallest, simplest measures can be the most effective in keeping your devices secure—they won’t take long, they’re easy to do, and you don’t really have any excuse for not doing them.
Here Are the Best Account Security Methods, According to Google – By David Murphy, Email, Twitter, Posts, lifehacker.com
Everywhere you turn, someone is handing out advice about account security and privacy. And while it never hurts to be reminded about all the ways you can protect your critical data, have you topped to wonder whether any of the various security measures you’re taking are actually effective?
WebAuthn Web Authentication with YubiKey 5 – By Todd A. Jacobs, www.linuxjournal.com
A look at the recently released YubiKey 5 hardware authenticator series and how web authentication with the new WebAuthn API leverages devices like the YubiKey for painless website registration and strong user authentication.
Google data shows 2-factor authentication blocks 100% of automated bot hacks – By Napier Lopez, thenextweb.com
Two-factor authentication is annoying. Getting flustered because you have to find your phone and tap on a prompt every time you log into your accounts from a new device is peak first-world problems. But if you ever had any doubt whether it really made you that much safer, Google has the data to dispel that uncertainty.
Wyze Sense review: This $20 sensor system is a steal for security DIYers – By Michael Ansaldo, www.techhive.com
Wyze Labs turned our conception of home security cameras on its ear with the Wyze Cam and Wyze Cam Pan. These two convention-defying cameras pack premium features like Full HD video, motion detection and tracking, and smart home integration into easy-to-install devices for just $20 and $30, respectively. Now they’ve done much the same by introducing a $20 home sensor system.
A particular type of scam phone call is making the rounds again and victimizing unsuspecting people. This time, it’s the old Microsoft tech support scam call.
Scammers are using technology to pose as employees of Microsoft and other companies. Here’s how to avoid being scammed.
The Best DIY Security System Might Also Be the Cheapest – By Tucker Bowe, gearpatrol.com
Wyze, the company behind one of our favorite smart security cameras (the $20 WyzeCam has essentially the same abilities as its way-more-expensive competitors by Amazon and Nest), just announced a new DIY smart alarms system that’s equally as inexpensive.
Never Lose Access to LastPass with Account Recovery on Mobile – By Amber Steel, blog.lastpass.com
LastPass takes away the burden of remembering passwords – and getting locked out of your accounts. But what if you forget your LastPass master password? It’s the one password you still need to remember. Because of our zero-knowledge security model, LastPass never knows your master password and therefore can’t reset it for you. So, what do you do if you’ve forgotten it?
The Best Way to Use Two-Factor Authentication – By Bree Fowler, www.consumerreports.org
In a world plagued by cyber threats, it takes more than a strong password to protect your personal information. According to security experts, you need a second layer of defense for your online accounts, complements of two-factor authentication (2FA).
Android phones transformed into anti-phishing security tokens – By John E Dunn, nakedsecurity.sophos.com
Google just announced a new security feature that allows users of Android 7 and later to use their smartphones to authenticate themselves to their Google accounts.
Two-Factor Authentication: Who Has It and How to Set It Up – By Eric Griffith, www.pcmag.com
In 2014, the Heartbleed exploit left everyone's login information potentially up for grabs thanks to one itty-bitty piece of code, and in the past few years our security nightmares have only gotten worse. In fact, more data was leaked in the first half of 2017 than in all of 2016 combined.
5 best two-factor authenticator apps for Android – By Contact, www.androidauthority.com
Two-factor authentication is a popular and powerful security tool. It requires you to verify that you actually logged into whatever account you logged into. This adds a personal touch. In order to hack your account, someone would need more than just your password and username. Of course, it’s not an end all, be all solution. However, it is nice having an extra layer of security. There are a few decent apps for this, although most sites use your phone number for text messaging. Those who want to use authenticator apps have only a few good choices. Here are the best ones for Android!
How to use your Android phone as a two-factor authentication security key – By Shannon Liao, www.theverge.com
Google added a new way to verify your logins this week: using your Android phone as a physical security key for two-factor authentication. You should be using two-factor authentication to log onto websites, so that even if someone has your password from a data breach, they won’t be able to get in. And now with the new feature, if you have an Android phone running 7 or higher, you also have a convenient security key.
SecurityWatch: How to Not Get Locked Out With Two-Factor Authentication – By Max Eddy, www.pcmag.com
Security tools often create a certain amount of anxiety. What happens if I lose my password? Or if my antivirus deletes my stuff? The advent of two-factor authentication has created a new twist on a familiar anxiety: what happens if I can't use my second factor and get locked out of my account?
Two-factor authentication explained: How to choose the right level of security for every account – By Michael Simon, www.pcworld.com
If you aren’t already protecting your most personal accounts with two-factor or two-step authentication, you should be. An extra line of defense that’s tougher than the strongest password, 2FA is extremely important to blocking hacks and attacks on your personal data. If you don’t quite understand what it is, we’ve broken it all down for you.
Your Android phone can now be a security key for your Google account – By Alex Wagner, www.phonedog.com
Two-factor authentication helps to secure your online accounts by adding a second step to the login process. Today Google is making it easier for Android users to add 2FA to their account.
Android 7.0+ Phones Can Now Double as Google Security Keys – by krebsonsecurity.com
Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google’s various services. The company announced that all phones running Android 7.0 and higher can now be used as Security Keys, an additional authentication layer that helps thwart phishing sites and password theft.
Google's most secure login system now works on Firefox and Edge, too By Stephen Shankland, www.cnet.com
Google has updated its support for hardware security keys so you no longer need to rely on its Chrome browser to log into websites like Gmail, YouTube and G Suite.
Why you should never allow your web browser to save your passwords By Jack Wallen, www.techrepublic.com
When a web browser like Chrome, Firefox or Safari is allowed to store passwords, you're putting your network security at risk.
What Is Encryption, and How Does It Work? By Email, www.howtogeek.com
Encryption has a long history dating back to when the ancient Greeks and Romans sent secret messages by substituting letters only decipherable with a secret key. Join us for a quick history lesson and learn more about how encryption works.
The Best Password Managers by thewirecutter.com
If you’re not using a password manager, start now. A password manager makes you less vulnerable online by generating strong random passwords, syncing them securely across your browsers and devices, and filling them in automatically. After 18 hours of research and testing, we believe that LastPass is the best password manager for most people. It has all the essential features, it works with virtually any browser on any device, and most of its features are free. (A Premium version, which costs $24 per year, adds advanced security features, better sharing, and other useful tools.
I Finally Set Up a Password Manager—and You Really Should, Too By Lauren Phillips, www.realsimple.com
Anyone who doesn’t already have a password manager needs one—stat. Talking about online security might not be the most glamorous topic, but with the huge number of password-requiring accounts and sites online, it’s quickly becoming one of the most important ones, especially because an ill-intentioned person with the right password can wreak havoc across one’s finances, social media accounts, and more.
Protecting Your Internet Accounts Keeps Getting Easier. Here’s How to Do It. By Brian X. Chen, www.nytimes.com
There are many tools for setting up two-factor authentication, a security mechanism that prevents improper access. These four methods are the most compelling.
Why you should never allow your web browser to save your passwords By Jack Wallen, www.techrepublic.com
When a web browser like Chrome, Firefox or Safari is allowed to store passwords, you're putting your network security at risk.
Logging In With A USB Key (U2F Explained) by Techquickie www.youtube.com VIDEO
Change your Facebook password now! By Paul Ducklin, nakedsecurity.sophos.com
Facebook has just admitted that it has found many places – hundreds of millions of places, maybe – where it saved users’ passwords to disk in raw, unencrypted form.
Google Password Manager: 7 Things You Must Know By Dan Price, www.makeuseof.com
A password manager is the perfect way to create secure, unique passwords that can be controlled centrally. Google Chrome has one built-in, potentially saving you the need for third-party software.
Privacy.com Review By Ash The Great, echeck.org
When you pay for something online, you are putting your financial and personal details at risk. No matter which form of payment you use, there is always a risk, and there is no way for you (the consumer) to know just how big or small the risk is. The sheer number of massive hacks and leaks over the last ten years is proof enough that we have no idea how safe our payment information really is. Privacy.com adds another layer of privacy. Every time you use your credit card, it generates a brand new set of details, and you use the new details to pay instead of your real payment details. It is like paying with a disposable credit card. Privacy.com allows you to generate new payment details that you can use to buy things online, and they call it, “Creating a virtual credit card.”
Google Smart Lock: The complete guide By Jr Raphael, www.computerworld.com
Think fast: How many times a day do you pick up your phone to look at something? Unless you live in the tundra or have far more self-control than most, the answer probably falls somewhere between "quite a few" and "more than any sane person could count." Assuming you keep your device properly secured, that means you're doing an awful lot of unlocking — be it with your face, your fingerprint, or the code you tap or swipe onto your screen.
10 Important Android Settings You Should Know! By Thiojoe, youtube.com VIDEO
Android is an extremely popular mobile OS, and I actually think most of you use it. So here are some important settings that you should know about if you don't already. They aren't hidden settings, so don't be surprised if you do know some. They aren't settings you should necessarily change, because most of these come down to preference.
13 Android Settings You Should Change Now! by ThioJoe youtube.com VIDEO
Those default settings are no good! Here's what to change… — Android has a lot of default settings that might be OK for most people, but there are some that really everyone should change. These might be settings related to privacy, security, or just plain convenience.
Firefox Send, Free File Transfers and Sharing with End to End Encryption.
Firefox Send uses end-to-end encryption to keep your files secure from the moment you share to the moment it's opened. You choose when your file link expires, the number of downloads and the option to add a password to protect the contents further.
Firefox Send also makes it easy to share large file sizes. You can share file sizes up to 1GB without a login. To send files up to 2.5GB, login to your Firefox account, if you don't have a Firefox account signup is free.
Firefox Send makes it easy for your recipient. They click the link you sent to download the file. They don’t need to have a Firefox account to download your file. Making the file sharing experience seamless for both parties, as quick as sending an email.
Here's the link to Firefox Send, save as a bookmark.
Note: This is a great tool for sharing event pictures and videos with other attendees. Simply upload your images, send everyone the link, as many as 100 people will have 7 days to download them.
How to Manage Saved Passwords in Chrome By Brady Gavin, www.howtogeek.com
Google Chrome comes with a handy password manager already built in. You can have your browser save and fill out passwords for different sites when you’re asked to sign in. Here’s how to manage all your saved passwords in Chrome.